Towards a block-cipher circuit resistant to multiple side channel attacks. This project aims to design, implement and verify the first ever fully comprehensive countermeasure against simultaneous attacks on devices performing a cryptographic task, such as a smart card or a mobile phone used for an electronic payment, through a variety of side channels. Side channel attacks aim to obtain unauthorized access to secret cryptographic keys used by such devices, by collecting and statistically process ....Towards a block-cipher circuit resistant to multiple side channel attacks. This project aims to design, implement and verify the first ever fully comprehensive countermeasure against simultaneous attacks on devices performing a cryptographic task, such as a smart card or a mobile phone used for an electronic payment, through a variety of side channels. Side channel attacks aim to obtain unauthorized access to secret cryptographic keys used by such devices, by collecting and statistically processing measurements of by-products of the physical operation of these devices, such as the consumed power or electromagnetic radiation. Rapid proliferation of personal devices used for electronic payments or containing sensitive data makes such a comprehensive countermeasure urgently needed.Read moreRead less
Design automation for secure, reliable and energy efficient embedded processors. This project seeks to create a methodology to design and generate processors which are both secure, reliable and energy efficient for deployment in Internet of Things (IoT) systems, which require little on-going maintenance. In such systems, both security and reliability are paramount, particularly in medical devices, control devices in critical machinery, financial transactions and automotive electronics. The proje ....Design automation for secure, reliable and energy efficient embedded processors. This project seeks to create a methodology to design and generate processors which are both secure, reliable and energy efficient for deployment in Internet of Things (IoT) systems, which require little on-going maintenance. In such systems, both security and reliability are paramount, particularly in medical devices, control devices in critical machinery, financial transactions and automotive electronics. The project will use an open RISC-V processor which is sufficiently flexible to function as a base processor, with a myriad of tools such as compilers and debuggers available. Reliable computing machinery will enable systems to work in hostile environments and be functionally correct for longer.Read moreRead less
Discovery Early Career Researcher Award - Grant ID: DE170101203
Funder
Australian Research Council
Funding Amount
$360,000.00
Summary
Multi-functional antenna arrays for secure and reliable wireless systems. This project aims to develop and validate the fundamental theory and engineering techniques for fully reconfigurable antenna arrays. Multi-functional antennae deliver highly-secure and reliable wireless communications for Australia’s digital economy. Such an antenna array, a critical component of wireless multi-functional systems, can provide full flexibilities of the frequency, polarisation and radiation pattern to satisf ....Multi-functional antenna arrays for secure and reliable wireless systems. This project aims to develop and validate the fundamental theory and engineering techniques for fully reconfigurable antenna arrays. Multi-functional antennae deliver highly-secure and reliable wireless communications for Australia’s digital economy. Such an antenna array, a critical component of wireless multi-functional systems, can provide full flexibilities of the frequency, polarisation and radiation pattern to satisfy the systems’ different requirements. This project is expected to advance the scientific knowledge of several frontiers of antenna research and enhance spectrum usage efficiency, highly-secure wireless communications and compact and reliable military wireless platforms, thus benefiting Australian industry, society and national defence.Read moreRead less
Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coord ....Energy big data analytics from a cybersecurity perspective. This project aims to develop a framework on energy big data analytics from security and privacy perspectives. Unlike other big data analytics such as social network big data analytics, energy big data analytics involve research challenges on how to cope with real-time tight cyber-physical couplings, and security/safety of the smart grid system. This project will develop advanced data-driven algorithms that are capable of detecting coordinated cyber-attacks that will potentially lead to catastrophic cascaded failures; and develop new solutions in detecting the false data-injection attacks that are conventionally considered as unobservable. This project will provide the benefit of enhancing our national critical infrastructure's security.Read moreRead less
Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor ....Privacy-preserving Biometrics based Authentication and Security. Password based authentication systems cannot verify genuine users. Biometric authentication can address this issue. However, the booming IoT applications and cloud computing require that the biometric authentication must be conducted in the privacy-protected setting in order to comply with privacy protection legal regulations. Latest reports show that current biometric authentication systems, under protected setting, exhibit poor authentication performance, which is not commercially applicable. This project aims to investigate innovative solutions to this issue. The intended deliverables will include deep learning based biometric feature extractor, cancellable biometrics and cloud oriented biometrics security protocols. Read moreRead less
A fast and effective automated insider threat detection and prediction system. Threats from insiders directly compromises the security, privacy and integrity of Australian e-commerce, large databases and communication channels. This project will provide an essential step in combating this criminal activity by developing methods to detect such threats and secure the public's information against exposure and identity theft.
Robust learning of dynamic systems. Robots and other autonomous machines use models of the real world to predict the result of their actions and make decisions, but existing methods used for machine-learning are unreliable in many cases and can be easily fooled. This project aims to make machine-learning of dynamic system models reliable, accurate, and secure. The outcomes of this project will be new models and algorithms that ensure safety and increase accuracy of models learned from data. This ....Robust learning of dynamic systems. Robots and other autonomous machines use models of the real world to predict the result of their actions and make decisions, but existing methods used for machine-learning are unreliable in many cases and can be easily fooled. This project aims to make machine-learning of dynamic system models reliable, accurate, and secure. The outcomes of this project will be new models and algorithms that ensure safety and increase accuracy of models learned from data. This project will benefit robotics, control engineering, infrastructure automation, and other fields that demand the capability to model physical systems from limited data. It will also improve cybersecurity by making learning algorithms resilient to deliberate attacks with false data.Read moreRead less